Category

Hacking
wordpress plugin vulnerability phishing redirect malware

WordPress plugins utilized for use in malicious campaign

With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tagDiv Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages. In this hack, users, when redirected, are taken to irritating...
Continue Reading
sqlite magellan vulnerability bug hacking

Unpatched SQLite Database exposed data to hackers

Cybersecurity scientists have found a basic weakpoint in the broadly utilized SQLite database programming that uncovered billions of deployments to cyber criminals. Named as ‘Magellan’ by security researchers, the newfound SQLite imperfection could enable remote assailants to execute self-assertive or malignant code on influenced gadgets, spill program memory or crash applications. SQLite is a lightweight,...
Continue Reading
zerofont phishing technique office365

ZeroFont Phishing Technique – Simple yet effective

Cyber criminals area at it again. And this time, they are after familiar territory – using ZeroFont on Microsoft Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in...
Continue Reading
sim swap attack smshing cryptocurrency

USD$2.5M worth of stolen CryptoCurrency from the latest SIM Swap Attacks

A man aged 20 from Dublin, was arrested and brought before the High Court on Thursday on foot of an extradition warrant. During a brief appearance, he indicated he understood the charges. He was remanded in custody until May 22. The US Attorney General for the Eastern State of Michigan said that their investigation had...
Continue Reading
data breach hacking fraud prevention

Human Resources company suffers Data Breach

One seriously threatening part about data breaches and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...
Continue Reading
atlassian server hacked inject trojans injection hacker malware

Critical Atlassian server flaw used by hackers to inject trojans

A group of attackers are actively exploiting a critical vulnerability in Atlassian’s Confluence collaboration software to inject trojans and infect servers with the GandCrab ransomware. Confluence is a Java-based web application that provides a shared wiki-type workspace for enterprise employees and is used by tens of thousands of companies worldwide. The vulnerability, tracked as CVE-2019-3396,...
Continue Reading
attack on banks smshing malware simjacking injection

Attack on Banks: Tactics and Techniques used to target Financial Organization

It has been said before that financial institution is losing an astounding amount yearly from cyberattacks. Monetizing attack on banks and financial institutions are no longer concentrated by cybercriminals; instead they shifted attention to employees from large business organizations. Workers occupying positions under financial departments, accountants and bank are realized that they can steal money...
Continue Reading
chinese hacking group hack malware

Major Health Insurance Hack of 2015 orchestrated by Chinese Hacking Group

The US Justice Department charged a chinese hacking group with carrying out one of the largest criminal hacks in United States health care history that resulted in 79 million people having their personal information stolen. In the four-count indictment cited by the Justice Department, officials allege Wang Fujie, 32, and another man referred to only...
Continue Reading
electricfish trojan malware

North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data

Executive Summary Two days ago (9th May), a Joint effort between Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) published a Malware Analysis Report (MAR) about a Trojan malware variant known as ELECTRICFISH. A North Korean based malicious actor known as HIDDEN COBRA is known to have utilized this malware. The targets...
Continue Reading
gps tracker compromised data

Popular But Flawed GPS Tracker Leaks User Locations Real-Time

Chinese-made GPS tracker that have no internet connectivity but use a SIM card to connect to a cell network are bought in bulk, rebranded, and resold by a number of companies worldwide.   UK cyber-security experts are calling for an immediate recall of a GPS tracker used as a panic alarm for elderly patients, monitoring...
Continue Reading
1 2 3 4 14